|Bsides Cleveland 2012 BsidesCLE|
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
Keywords: security; hacking
Downloads: 1,020 (1 review)
|OHM2013: Julian Assange - Wikileaks Fights On|
How is Wikileaks dealing with the assault against it and what new leaks it is making available to the world. Wikileaks founder Jullian Assange will be speaking over video link from the Equadorian Embassy in London.Presenter: Julian Assangehttps://program.ohm2013.org/event/324.html Day 1 Start time 22:00 Duration 1:00 Location T1: Orwell Hall Type Lecture Track Observe
Keywords: OHM2013; wikileaks; julian assange
Downloads: 53 (1 review)
|OHM2013: Zoltan Balazs - The quest for the client-side elixir against zombie browsers|
Hacking client side protection systems (sandboxes, internet security suites, financial endpoint protection systems) with malicious browser extensions. In 2012 I have created and published proof-of-concept malicious browser extensions for Firefox, Chrome and Safari. With these, one can steal cookies, passwords, spy on webcam, use the browser as a proxy, change financial transactions in the background, steal files, and many more malicious things...
Keywords: OHM2013; talk; sandbox; security; browser extention; firefox; chrome; safari; Zoltan Balazs
Downloads: 17 (1 review)
|Open Source Intelligence: Data Patterns on the WWW - Valdis Krebs|
Valdis will present his work in "open source intelligence" -- finding interesting data and patterns on the WWW and making sense of them. He will explain how he used the web to create various network analyses with purely public information. * 9/11 hijackers, their supporters, and their connections * book buying patterns on Amazon * economic development community in NE Ohio * the blogosphere in NE Ohio Valdis will explain a simple method to follow in tracking web data and how Google is the only re...
Downloads: 43 (1 review)
|Jason Scott's Presentation Presentation - Jason Scott|
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice remai...
Keywords: presentation; jason scott; notacon
Downloads: 1,941 (1 review)
|Super Jason Scott Presentation 64 - Tedd St. Rain|
Presented at Notacon 6 in Cleveland, OH on April 17, 2009. Jason Scott walks through the context and playing of Super Mario 64, the Mario Brothers launch title accompanying the Nintendo 64. Talks about the growing field of "Platform Studies", the lessons learned from the unique situation of Super Mario 64, and describes ways that modern programmers and coders can learn from the approach taken to the relatively new general experience of the 3D Platformer in 1996...
Keywords: nintendo; mario; jason scott; notacon; blockparty; cleveland
Downloads: 2,639 (1 review)
|Clobbering the Cloud - Harron Meer|
|LAN for Life Charity Events - Kel Cecil|
I would like to share the methodology that we have used when planning and executing our "LAN for Life" events. This method has been the result of over two years of careful study of our events as well as other LAN party events. I'll begin by discussing the initial steps of planning the event, such as setting a proper date and finding a suitable location for an event. Next, I'll discuss the process of acquiring local and national corporate sponsors...
|Announcement of CTF Winners and Final HITB Charity Auction - HITB Organizers|
|How to Own the World One Desktop at a Time - Saumin Shah|
|Outbound Content Compliance - Jim Noble|
Outbound Content Compliance is a growing industry within Information Security. This area of control watches traffic and data in networks to scan the content for potential violations of policy. With the increase in visibility of personal data loss, organizations are increasingly coming under fire to tighten their controls, and ensure data privacy to the consumer. Today, several 1st generation products provide the visibility to the "data leakage", providing the ability to modify existing controls ...
|Passive Asset Detection System - Matt Shelton|
|Keynote - Ryan Russell|
|Using Honeyclients to Discover New Attacks - Kathy Wang|
|Origins of a Hackercon|
Re-LoaD talks about how the Brumcon 2600 event was started. Recorded at LUG Radio Live 2009 in Wolverhampton, England.
Keywords: LUG; Radio; LUGradio; live; re-load; brumcon; origins; hackercon
|Saturday Keynote - Jennifer Granick|
Jennifer Stisa Granick joined Stanford Law School in January 2001, as Lecturer in Law and Executive Director of the Center for Internet and Society (CIS). She teaches, speaks and writes on the full spectrum of Internet law issues including computer crime and security, national security, constitutional rights, and electronic surveillance, areas in which her expertise is recognized nationally. Granick came to Stanford after almost a decade practicing criminaldefense law in California...
|2007 BlackHat Vegas-V33-Baker-Kick Ass Hypervisoring.mp4|
2007 BlackHat Vegas-V33-Baker-Kick Ass Hypervisoring.mp4
|How Low Will Malware Go - Nishad Herath|
|Cross Site Scripting MySpace dot Com - Rick Deacon|
How to exploit Cross Site Scripting holes in MySpace.com, for session hijacking or other means. Multiple exploits will be discussed. Depending on the information present at the time, some may be 0-day. The methodology and practices involved will always be relevant to MySpace as well as many other sites containing Cross Site Scripting holes. MySpace is still filled with hundreds of unattended and undiscovered Cross Site Scripting exploits...
|2007 BlackHat Vegas-V27-Feinstein-Peck-CaffeineMonkey.mp4|
2007 BlackHat Vegas-V27-Feinstein-Peck-CaffeineMonkey.mp4
|2007 BlackHat Vegas-V45-Stender-Blind Security Testing.mp4|
2007 BlackHat Vegas-V45-Stender-Blind Security Testing.mp4
|OHM2013: Quux - ColoClue lightening talk|
Introduction to ColoClue and why you want to become a member.http://coloclue.net/https://program.ohm2013.org/event/386.html
Keywords: OHM2013; talk; lightning talk; ColoClue; quux
|Hacking from the Restroom - Bruno Goncalves|
|Snort Overview - Cazz|
|2007 BlackHat Vegas-V56-Schmiedl-Spindel-Stregths-Weakness ACS.mp4|
2007 BlackHat Vegas-V56-Schmiedl-Spindel-Stregths-Weakness ACS.mp4
|2007 BlackHat Vegas-V6-Schneider-Reflective DNS Poison.mp4|
2007 BlackHat Vegas-V6-Schneider-Reflective DNS Poison.mp4
|2007 BlackHat Vegas-V23-Grossman-Hansen-Hacking Intranet.mp4|
2007 BlackHat Vegas-V23-Grossman-Hansen-Hacking Intranet.mp4
|2007 BlackHat Vegas-V57-DeHaas-Side Channel Attacks-DPA.mp4|
2007 BlackHat Vegas-V57-DeHaas-Side Channel Attacks-DPA.mp4
|2007 BlackHat Vegas-V14-Panel-Meet The VCs.mp4|
2007 BlackHat Vegas-V14-Panel-Meet The VCs.mp4
|2007 BlackHat Vegas-V65-Perry-Securing the Tor Net.mp4|
2007 BlackHat Vegas-V65-Perry-Securing the Tor Net.mp4
|2007 BlackHat Vegas-V66-Dingledine-Mathewson-Tor and Blocking.mp4|
2007 BlackHat Vegas-V66-Dingledine-Mathewson-Tor and Blocking.mp4
|2007 BlackHat Vegas-V51-Christy-Panel-Meet the Fed.mp4|
2007 BlackHat Vegas-V51-Christy-Panel-Meet the Fed.mp4
|2007 BlackHat Vegas-V53-Heasman-Hacking extensible Firmware.mp4|
2007 BlackHat Vegas-V53-Heasman-Hacking extensible Firmware.mp4
|2007 BlackHat Vegas-V22-Byrne-Anti-DNS Pinning.mp4|
2007 BlackHat Vegas-V22-Byrne-Anti-DNS Pinning.mp4
|2007 BlackHat Vegas-V28-Snyder-Shaver-Building and Breaking Browser.mp4|
2007 BlackHat Vegas-V28-Snyder-Shaver-Building and Breaking Browser.mp4
|2007 BlackHat Vegas-V49-Harbour-Stealth Secrets Malware Ninjas.mp4|
2007 BlackHat Vegas-V49-Harbour-Stealth Secrets Malware Ninjas.mp4
|2007 BlackHat Vegas-V60-Geers-Greetz from room 101.mp4|
2007 BlackHat Vegas-V60-Geers-Greetz from room 101.mp4
|2007 BlackHat Vegas-V61-Coffey-Viega-Building and Effective AppSec.mp4|
2007 BlackHat Vegas-V61-Coffey-Viega-Building and Effective AppSec.mp4
|2007 BlackHat Vegas-V54-Barisani-Bianco-Injecting-RDS-TMC.mp4|
2007 BlackHat Vegas-V54-Barisani-Bianco-Injecting-RDS-TMC.mp4
|2007 BlackHat Vegas-V58-Clark-Year in Review.mp4|
2007 BlackHat Vegas-V58-Clark-Year in Review.mp4
|2007 BlackHat Vegas-V19-Eriksson-Oberg-Nyberg Janmar-Kernel Wars.mp4|
2007 BlackHat Vegas-V19-Eriksson-Oberg-Nyberg Janmar-Kernel Wars.mp4
|APRSHAM Radio - MARES|
|The Chaos Communications Congress Blinkenlights Press Video Collection|
A collection of videos related to the Blinkenlights projects of the Chaos Communications Congress, mostly press and news programs.
|Countering Attacks at Layer 2 - Eric Smith|
Network security at layer two is often overlooked because many administrators do not consider attacks from within to be a credible threat. This philosophy may apply to carefully firewalled data centers, but universities and other institutional settings are particularly vulnerable to attacks at layer two. Furthermore, nearly all wireless networks, even those employing WPA or 802.1x, can fall victim to the inherent trust designs of the underlying ethernet protocols...
|Network Policy Enforcement / Network Quarantine - Latest Security Gimmick or Good Idea? - Steve Manzuik|
Steve Manzuik has more than 13 thirteen years of experience in the information technology and security industry, with a particular emphasis on operating systems and network devices. In 2001, Mr. Manzuik founded and was the technical lead for Entrench Technologies. Prior to Entrench, Mr. Manzuik was a manager in Ernst & Young's Security & Technology Solutions practice, where he was the solution line leader for the Canadian Penetration Testing Practice...
|Codecon 2004 Audio Collection|
|The reality of the user - Hadi, Niels ten Oever, FiekeJ|
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare
|Codecon 2002 Audio Collection|
|Hacker Conference Photos (1990s)|
|PDF Origami Strikes Back - Frederic Raynal - Guillaume Deluge - Damien Aumaitre|